Sciweavers

1080 search results - page 143 / 216
» Improving Software Inspections by Using Reading Techniques
Sort
View
CLEIEJ
2002
121views more  CLEIEJ 2002»
13 years 9 months ago
Methodological Approach for Developing a KMS: A Case Study
This article describes the construction of a Knowledge Management System (KMS) by applying fundamental concepts and principles of Software Engineering, such as process, models, me...
Anna Grimán, Teresita Rojas, María A...
ICSE
2012
IEEE-ACM
11 years 11 months ago
Predicting performance via automated feature-interaction detection
Abstract—Customizable programs and program families provide user-selectable features to allow users to tailor a program to an application scenario. Knowing in advance which featu...
Norbert Siegmund, Sergiy S. Kolesnikov, Christian ...
ICSE
2005
IEEE-ACM
14 years 9 months ago
Testing database transactions with AGENDA
AGENDA is a tool set for testing relational database applications. An earlier prototype was targeted to applications consisting of a single query and included components for popul...
Yuetang Deng, Phyllis G. Frankl, David Chays
FCCM
2007
IEEE
146views VLSI» more  FCCM 2007»
14 years 3 months ago
Mitrion-C Application Development on SGI Altix 350/RC100
This paper provides an evaluation of SGI® RASC™ RC100 technology from a computational science software developer’s perspective. A brute force implementation of a two-point an...
Volodymyr V. Kindratenko, Robert J. Brunner, Adam ...
CC
2006
Springer
125views System Software» more  CC 2006»
13 years 9 months ago
A tight lower bound for restricted pir protocols
We show that any 1-round 2-server Private Information Retrieval Protocol where the answers are 1-bit long must ask questions that are at least n - 2 bits long, which is nearly equa...
Richard Beigel, Lance Fortnow, William I. Gasarch